EP2070268A1 - Routeur coeur apte a securiser un routeur de sortie d'un systeme autonome - Google Patents
Routeur coeur apte a securiser un routeur de sortie d'un systeme autonomeInfo
- Publication number
- EP2070268A1 EP2070268A1 EP07823848A EP07823848A EP2070268A1 EP 2070268 A1 EP2070268 A1 EP 2070268A1 EP 07823848 A EP07823848 A EP 07823848A EP 07823848 A EP07823848 A EP 07823848A EP 2070268 A1 EP2070268 A1 EP 2070268A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- router
- autonomous system
- nominal output
- asbr1
- traffic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000001681 protective effect Effects 0.000 claims abstract description 51
- 238000000034 method Methods 0.000 claims description 48
- 238000004590 computer program Methods 0.000 claims description 8
- 238000004891 communication Methods 0.000 description 4
- 238000001514 detection method Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000001012 protector Effects 0.000 description 3
- 239000004148 curcumin Substances 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000011664 signaling Effects 0.000 description 2
- 230000005641 tunneling Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000004377 microelectronic Methods 0.000 description 1
- 238000011144 upstream manufacturing Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
- H04L45/033—Topology update or discovery by updating distance vector protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/22—Alternate routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/28—Routing or path finding of packets in data switching networks using route fault recovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/50—Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]
Definitions
- Heart router capable of securing an output router of an autonomous system
- the invention is in the field of telecommunications, and more particularly type I P / MPLS (I nternet Protocol / Multi Protocol Label Switching) type switching networks.
- type I P / MPLS I nternet Protocol / Multi Protocol Label Switching
- MPLS is not described here, for more information refer to the I nternet Engineering Task Force (I ETF), Request for Comment RFC 3031.
- the invention is in the context of I P / MPLS networks comprising cores routers, called P routers, and access or border routers called ASBR.
- P routers cores routers
- ASBR access or border routers
- Some so-called "Fiat I P" I P / MPLS networks use I P switching on all the core routers located between the edge routers.
- an ASBR is a border router of an autonomous system establishing at least one eBGP session with another autonomous system.
- ASBR autonomous system output router
- the Fast Reroute which consists of establishing local emergency paths bypassing the protected element in advance.
- the directly upstream node updates its routing table and switches traffic to the backup path. This method does not require any route calculation or signaling after the failure.
- the backup routes are preinstalled in the switch tables of the routers, which guarantees a deterministic rerouting time of less than 100ms.
- the MPLS Fast Reroute mode based on the establishment of end-to-end MPLS-TE primary tunnels protected locally by MPLS-TE backup tunnels, this mode being described in RFC 4090 of the I ETF;
- the MPLS Fast Reroute mode allows, with a mesh of the edge routers by primary MPLS-TE tunnels, a protection of the ASBR-P links, PP and P nodes. It is difficult to scale because it requires a mesh of all ASBR routers and therefore requires a number of tunnels squared the number of ASBRs. It is therefore applicable in practice only to a small number of ASBRs (- 100).
- the IP Fast Reroute mode provides protection for ASBR-P, PP and P-node links. It does not require primary MPLS-TE tunnels and is therefore much better scaled.
- the current Fast Reroute techniques discussed above do not protect ASBR routers on an IP / MPLS network.
- the Fast Reroute I P technique does not make it possible to protect the ASBR routers, these being located at the end of the tunnel or being a designated exit point of the network and therefore can not be bypassed in case of failure.
- the current protection techniques only use information from the internal routing protocol I GP (I nternai Gateway Protocol), and can only secure failures of elements internal to the network. They are therefore not usable to secure ASBRs, edge routers between two autonomous sites, their protection requiring consideration of external routing information distributed by the BGP protocol.
- the invention aims at a core router of a first autonomous system, this core router being connected to a nominal output router of the first autonomous system, able to carry traffic intended for a second autonomous system, the first system autonomous device further comprising at least one emergency exit router, capable of conveying traffic intended for the second autonomous system, said core router comprising: means for identifying a router of the first autonomous system, arranged to identify a suitable router to route the traffic destined for second autonomous system in the event of a failure affecting the traffic to said nominal output router, the identified router being either the emergency exit router or a so-called protective router of the first autonomous system, this protective router being able to redirect the traffic destined for the second autonomous system via said at least one emergency exit router;
- the protection mechanism according to the invention is based on local protection of a nominal output router by one or more core routers directly connected to this nominal output router. Such a heart router will be called thereafter "router P protector”.
- the protecting router P reroutes the traffic:
- the means for identifying a router use a correspondence table indicating a router to use in case of failure.
- This lookup table is pre-installed in a switch table of the core router. This characteristic advantageously makes it possible to guarantee a deterministic re-routing time of less than 100 ms in the event of a fault affecting the communication with the nominal output router.
- the invention also aims at an emergency exit router capable of cooperating with the core router according to the invention.
- the emergency exit router of a first autonomous system capable of routing the traffic destined for a second autonomous system, comprises: means for exchanging, with a core router of said first autonomous system, information according to which a tunnel is used during a failure affecting the routing of the traffic from said core router to a nominal output router of said first autonomous system, said router nominal output being able to carry traffic destined for the second autonomous system,
- the emergency exit router of a first autonomous system able to route the traffic intended for a second autonomous system, comprises:
- means for creating a contextual switching table comprising at least one route to said second autonomous system, said at least one route not passing through said nominal output router; and means for using said table to route received packets with said context label to the second autonomous system.
- the invention also aims at a protective router adapted to cooperate with the core router according to the invention.
- the protective router that can be used in a first autonomous system comprises:
- the protective router that can be used in a first autonomous system comprises:
- the core router according to the invention further comprises means for exchanging with the end of the tunnel (in other words with the emergency exit router or with the protective router according to the invention) a piece of information. according to which this tunnel is used during said failure.
- the protective core router according to the invention comprises means for exchanging a contextual label to be used during said failure and means for adding said contextual label to a packet before redirecting said traffic intended for the second system. autonomous.
- the identification means of the protective core router arranged to identify a router capable of routing the traffic destined for the second autonomous system in the event of a failure affecting the traffic to said nominal output router, identify a router to be used in case of failure from protection group announcements issued by routers of the first autonomous system.
- the core router comprises means for detecting this group identifier sent by the nominal output router and means for configuring its switching table with the protective router (or with the output router if it emits the same group ID.
- the heart-protecting router can thus dynamically discover the nominal output router or routers it protects.
- the core router can dynamically discover the protective routers protecting a nominal output router.
- an I / MPLS network can contain several protection groups.
- a router can belong to several protection groups.
- the protection groups to which a nominal output router belongs are announced in the routing protocol I GP, using a new TLV in the I GP message used to advertise the properties of the nodes. After the failure of a nominal output router, the protocols
- I GP, BGP, LDP, and RSVP-TE will react and the route to this nominal output router will be dropped in the tables of other core routers and other output routers.
- the core router comprises means for deferring an announcement of the failure to the other routers of the first autonomous system for at least a predetermined duration.
- the core router according to the invention announces, during this predetermined duration, a specific or high metric for joining said nominal output router, typically the maximum metric allowed by the internal routing protocol.
- the routing / signaling protocols announce the failure in a conventional manner.
- the emergency exit router and / or the protective router use the BGP protocol. They create a contextual switching table for each nominal output router that it protects. To select the BGP routes to be installed in this table, it considers the set of potential BGP routes from which it removes:
- the emergency exit router and / or the protection router does not select in its contextual switching table the routes of the nominal output router (ASBR1) which will no longer be valid during the ASBRI failure.
- the invention also aims at a routing method that can be implemented by a heart router in a first autonomous system, this core router being connected to a nominal output router, able to carry traffic intended for a second autonomous system, the first autonomous system further comprising at least one output router of backup, adapted to carry traffic intended for the second autonomous system, said method comprising:
- a step of identifying a router of the first autonomous system in which a router is identified capable of routing the traffic destined for the second autonomous system in the event of a failure affecting the traffic to said nominal output router, the identified router being either the emergency exit router, a so-called protective router of the first autonomous system, the protective router being able to redirect the traffic destined for the second autonomous system via the said at least one emergency exit router;
- the invention also relates to a routing method that can be implemented in an emergency exit router in a first autonomous system and capable of carrying traffic intended for a second autonomous system, this method comprising: an exchange step with a heart router of said first autonomous system, information according to which a tunnel is used during a failure affecting the routing of the traffic of said core router to a nominal output router of said first autonomous system, said nominal output router being suitable to route traffic to said second autonomous system,
- a step of creating a contextual switching table comprising at least one route to said second autonomous system, said route not passing through said nominal output router;
- the invention also provides a routing method that can be implemented in an emergency exit router in a first autonomous system and capable of carrying traffic intended for a second autonomous system, this method comprising: an exchange step, with a core router of said first autonomous system, of a contextual label to be used during a fault affecting routing the traffic of said heart router to a nominal output router of said first autonomous system, said nominal output router being able to route traffic to the second autonomous system;
- a step of creating a contextual switching table comprising at least one route to said second autonomous system, said route not passing through said nominal output router;
- the invention also aims at a routing method that can be implemented in a protective router in a first autonomous system, this method comprising:
- a step of creating a contextual switching table comprising at least one route to said second autonomous system, the route passing through an emergency exit router of said first autonomous system and capable of conveying traffic intended for said second autonomous system, said route using an exit tunnel to said backup exit router not passing through said nominal output router;
- the invention also provides a routing method that can be implemented in a protective router in a first autonomous system, this method comprising: an exchange step, with a core router of said first autonomous system, a contextual label to be used during a failure affecting the routing of the said core router traffic to a nominal output router of said first autonomous system, the nominal output router being able to route traffic to the second autonomous system; a step of creating a contextual switching table comprising at least one route to said second autonomous system, the a route passing through an emergency exit router of said first autonomous system and adapted to route traffic destined for said second autonomous system, said route using an exit tunnel to said emergency exit router not passing through said nominal output router; and a step of switching packets received with said contextual label using said table, in said output tunnel destined for the second autonomous system.
- the various steps of at least one routing method mentioned above are determined by computer program instructions.
- the invention also relates to a computer program on an information medium, this program being capable of being implemented in a router or more generally in a computer, this program comprising instructions adapted to the implementation steps of a routing method as described above.
- This program can use any programming language, and be in the form of source code, object code, or intermediate code between source code and object code, such as in a partially compiled form, or in any other form desirable shape.
- the invention also relates to a computer-readable information medium, comprising instructions of a computer program as mentioned above.
- the information carrier may be any entity or device capable of storing the program.
- the medium may comprise storage means, such as a ROM, for example a CD ROM or a microelectronic circuit ROM, or a magnetic recording medium, for example a floppy disk or a disk. hard.
- the information medium may be a transmissible medium such as an electrical or optical signal, which may be conveyed via an electrical or optical cable, by radio or by other means.
- the program according to the invention can in particular be downloaded to a network of the Internet type.
- the information carrier may be an integrated circuit in which the program is incorporated, the circuit being adapted to execute or to be used in the execution of the method in question.
- FIG. 1 and 2 show, in their environment, routers according to the invention in a first embodiment of the invention
- FIG. 3 and 4 show, in their environment, routers according to the invention in a second embodiment of the invention
- FIG. 5 represents, in flowchart form, the main steps of a first routing method according to the invention in a particular embodiment
- FIG. 6 represents, in flowchart form, the main steps of a second routing method according to the invention in a particular embodiment.
- Tunnel means here a generic definition of the term. It may be a GRE tunnel, for "Generic Routine Encapsulation", an L2TFV3 tunnel, for "Layer 2 Tunneling Protocol Version 3" or a tunnel
- FIG. 1 represents a network comprising two autonomous systems AS1 and AS2.
- the AS1 autonomous system comprises a core router P according to the invention, a switching table is referenced Fl B_P.
- the heart router P is connected to a nominal output router ASBR1 AS1 autonomous system, able to route traffic to the second autonomous system AS2.
- the switching table of the nominal output router ASBR1 is referenced Fl B_1.
- the AS1 autonomous system also comprises an output router ASBR2 according to the invention for conveying traffic to the second autonomous system AS2.
- the switching table of the output router ASBR2 is referenced Fl B_2.
- the second autonomous system AS2 there is shown a destination D of address 10.0.1.2, and two routers R1 and R2 arranged between the destination D and the output routers ASBR1 and ASBR2.
- the first autonomous system AS1 comprises a transit router T between the heart router P and the output router ASBR2.
- the switching table of the transit router T is referenced Fl B_T.
- the heart router P and the output router ASBR2 cooperate to secure failures affecting a routing of the heart router traffic P to the ASBR1 nominal output router.
- the IF switch table B_P of the heart router P has two outputs for the destination D of address 10.0.1.2, namely:
- the output router ASBR2 is therefore an emergency exit router within the meaning of the invention.
- the tunnel 1 T passes through the transit router T and the switch table FI B_T of this router is configured to route the packets destined for the emergency exit router ASBR2 on its interface if 5.
- FIG. 1 shows the state of the network before the failure affecting the routing of the core router P traffic to the ASBR1 nominal output router. Also, only the nominal output of the switching table
- FI B_P of the heart router P is activated.
- the router heart P receives a packet for site D, it sends this packet on its interface if1 to the nominal output router.
- the nominal output router On receipt of this packet, the nominal output router transfers this packet, according to its switching table Fl B_1, on its interface if 3 to the router R1 of the second autonomous system AS2, this packet being finally switched within the second autonomous system to destination D.
- the heart router P detects a failure affecting its communication to the nominal output router ASBR1.
- the heart router P receives a packet intended for the site D, it sends this packet in the tunnel 1T to the ASBR2 emergency exit router.
- the emergency exit router Upon receipt of this package, the emergency exit router
- ASBR2 transfers this packet according to its switch table
- the first autonomous system AS1 comprises an ASBRP protective router according to the invention between the heart router P and the ASBR2 emergency exit router.
- the switching table of the ASBRP protective router is referenced FI B_RP.
- FIG. 3 there are shown two transit routers T placed respectively:
- Transit routers T are optional, they are not concerned by the invention.
- the heart router P, the ASBRP protective router and the ASBR2 output router cooperate to secure the failures affecting the routing of the core router P traffic to the ASBR1 nominal output router.
- the IF switch table B_P of the core router P has two outputs for the destination D of address 10.0.1.2, namely: a nominal output, on its interface if1, to the nominal output router ASBR1; and
- the tunnel 2T is used only for the protection of the nominal output router ASBR1. If several nominal output routers were to be protected, we can for example:
- FIG. 3 shows the state of the network before the fault affecting the communication of the heart router P to the nominal output router ASBR1. Also, only the nominal output of the IF switch table B_P of the core router P is activated. As a result, when the core router P receives a packet destined for the site D, it sends this packet on its interface if1 to the nominal output router. On receipt of this packet, the nominal output router transfers this packet, according to its switching table Fl B_1, on its interface if 3 to the router R1 of the second autonomous system AS2, this packet being finally switched within the second autonomous system to the destination D. The route followed, before the failure, by the packets between the heart router P and the destination D is shown in dotted lines in FIG.
- the heart router P detects a failure affecting the routing of the traffic to the nominal output router ASBR1.
- the heart router P receives a packet intended for the site D, it sends this packet in the tunnel 2T to the ASBRP protective router.
- the ASBRP protecting router transfers this packet, in accordance with its FI switch table B_RP, into a 3T tunnel to the ASBR2 backup output router.
- the emergency exit router Upon receipt of this package, the emergency exit router
- ASBR2 transfers this packet, in accordance with its IF switch table B 2, on its interface if4 to the router R2 of the second autonomous system AS2, this packet being finally switched within the second autonomous system to the destination D.
- the tunnel 3T is directly associated with the interface if4.
- a generic tunnel could be used in which a contextual label would be used to differentiate the packets destined for that particular interface.
- the different routers have the hardware architecture of a conventional computer. They include, in particular, a processor, a ROM type ROM in which a computer program and a random access memory of the RAM type can be stored, allowing the execution of this program.
- the heart router P stores, in its ROM type ROM, a computer program according to the invention, this program including instructions for executing the steps of FIG. a routing method according to the invention and whose main steps E10 to E100 are represented in flow chart form in FIG.
- the emergency exit router ASBR2 and the protective router ASBRP according to the invention store, in their ROM-type ROMs, a computer program according to the invention, this program comprising instructions for carrying out the steps of a routing method according to the invention and whose main steps F10 to F40 are represented in flow chart form in FIG. 6.
- the emergency exit router ASBR2 and the protective router ASBRP announce their protection function and the identifier of a protection group to which they belong.
- the ASBR1 router announces "Nominal Output Router", group 1;
- announcements are received by the core router P according to the invention during a step E10 of its routing method.
- ASBR2 and ASBRP routers protect the ASBR1 nominal output router, these three routers having announced that they belong to the same identifier protection group 1.
- This contextual label exchange is performed during a step E ⁇ 20 of the routing method implemented by the core router P and during a step F20 of the routing method implemented by the ASBR2 backup output router and by the ASBRP protective router.
- each of the ASBR2 and ASBRP routers configures a contextual switching table.
- the heart router P preinstalls in its switching table Fl B_P:
- the heart router P identifies from protection group announcements the ASBR2 emergency exit router and the protective router ASBRP.
- this particular embodiment uses a correspondence table in which the equipment (protective router, emergency exit router) is pre-configured to be used in the event of a failure affecting a particular nominal output router.
- the equipment protective router, emergency exit router
- it identifies the router to use in case of failure from the correspondence table.
- the ASBR2 emergency exit router creates a contextual switching table FI B 2 associated with the contextual label.
- the protective router ASBRP creates a contextual switching table FI B RP associated with the contextual label LB. Then during a step F40, it determines the routes to be inserted in Fl B_RP.
- the routing methods implemented in the ASBR2 emergency exit router and in the ASBRP protective router differ in the way in which they determine the routes to be inserted into their FI B_2 and FI B_RP context tables.
- the ASBR2 escape route router selects the route from among a set of potential BGP routes from which it removes: - the routes whose exit point (next hop) or originator (originator_id) is the router nominal output ASBR1; and
- the ASBRP protective router selects the route from among a set of potential BGP routes from which it removes:
- the routes chosen by the ASBR2 emergency exit router and the ASBRP protective router do not pass through the ASBR1 nominal output router.
- the heart router P activates, during a step E40, the nominal output of this table.
- the heart router P detects, during a step E50 of its routing method, a failure affecting the routing of the traffic to the nominal output router ASBR1. Following this detection, it activates, during a step E60, the emergency exit so as to redirect the traffic destined for the second autonomous system AS2 in the tunnel 1T or 2T. During this same step it disables the output to the nominal route.
- the heart router P adds the context label LB to each packet before sending it to the tunnel 1T or 2T.
- the ASBR2 emergency exit router respectively the protective router ASBRP, routes the received packet to said second autonomous system using the FI table B_2, respectively FI B_RP.
- the heart router P according to the invention differs the announcement of the failure to the other routers of the first autonomous system AS1 for a predetermined duration.
- the heart router P triggers, during a step E ⁇ 70, a countdown initialized with this predetermined duration.
- the heart router P announces, during this predetermined duration (step E80), the maximum metric allowed by the internal routing protocol for joining the nominal output router. It thus prevents the source of the traffic that it should if possible use an escape route.
- the heart router P detects the expiration of the countdown.
- a single tunnel is used per failure.
- the heart router P establishes a tunnel with the ASBR2 emergency exit router or ASBRP protective router and transmits information that the tunnel is used in case of failure affecting the routing of traffic to the nominal output router ASBR1.
- the emergency exit router ASBR2 respectively the protective router ASBRP
- the reception of a packet in this tunnel indicates to the ASBRP emergency exit router, respectively to the ASBRP protective router, that the failure has occurred and that it must redirect the traffic using the table.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| FR0653925A FR2906429A1 (fr) | 2006-09-25 | 2006-09-25 | Routeur coeur apte a securiser un routeur de bordure dans un reseau |
| PCT/FR2007/052003 WO2008037921A1 (fr) | 2006-09-25 | 2007-09-25 | Routeur coeur apte a securiser un routeur de sortie d'un systeme autonome |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| EP2070268A1 true EP2070268A1 (fr) | 2009-06-17 |
| EP2070268B1 EP2070268B1 (fr) | 2018-01-10 |
Family
ID=37912479
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP07823848.2A Not-in-force EP2070268B1 (fr) | 2006-09-25 | 2007-09-25 | Routeur coeur apte a securiser un routeur de sortie d'un systeme autonome |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US8223629B2 (fr) |
| EP (1) | EP2070268B1 (fr) |
| FR (1) | FR2906429A1 (fr) |
| WO (1) | WO2008037921A1 (fr) |
Families Citing this family (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8259564B1 (en) * | 2008-12-12 | 2012-09-04 | Juniper Networks, Inc. | Egress protection for label switched paths |
| US9246838B1 (en) | 2011-05-27 | 2016-01-26 | Juniper Networks, Inc. | Label switched path setup using fast reroute bypass tunnel |
| FR3044849A1 (fr) * | 2015-12-07 | 2017-06-09 | Orange | Procede anti-micro-boucle pendant la convergence de tables de commutation |
| CN106941686A (zh) * | 2016-01-05 | 2017-07-11 | 中国移动通信集团山东有限公司 | 一种路径调整方法、oss网管及ptn网管 |
| US10778563B1 (en) * | 2018-03-22 | 2020-09-15 | Amazon Technologies, Inc. | Brick identifier attribute for routing in multi-tier computer networks |
| US11144217B2 (en) * | 2018-10-02 | 2021-10-12 | Jmicron Technology Corp. | Data protection method and associated storage device |
| US12355659B2 (en) | 2021-12-10 | 2025-07-08 | Cisco Technology, Inc. | Ultimate regional fallback path for hierarchical SD-WAN |
| EP4445561A1 (fr) * | 2021-12-10 | 2024-10-16 | Cisco Technology, Inc. | Trajet de repli régional ultime pour sd-wan hiérarchique |
Family Cites Families (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE10335335A1 (de) * | 2003-08-01 | 2005-03-10 | Siemens Ag | Verfahren für ein Inter-Domain Mehrwege-Routing |
| US7539131B2 (en) * | 2003-11-26 | 2009-05-26 | Redback Networks Inc. | Nexthop fast rerouter for IP and MPLS |
| US7590046B1 (en) * | 2003-12-31 | 2009-09-15 | Ciena Corporation | Protected SONET/SDH networks having delayed fault propagation |
| US7512063B2 (en) * | 2004-12-14 | 2009-03-31 | Cisco Technology, Inc. | Border router protection with backup tunnel stitching in a computer network |
| US20060133265A1 (en) * | 2004-12-22 | 2006-06-22 | Alcatel | Virtual private networking methods and systems |
| US7535828B2 (en) * | 2005-03-18 | 2009-05-19 | Cisco Technology, Inc. | Algorithm for backup PE selection |
| US7609628B2 (en) * | 2005-09-07 | 2009-10-27 | At&T Intellectual Property I, L.P. | System and method for fault-tolerance in an inter-carrier network interface |
| US7864669B2 (en) * | 2005-10-20 | 2011-01-04 | Cisco Technology, Inc. | Method of constructing a backup path in an autonomous system |
| US7903584B2 (en) * | 2006-01-06 | 2011-03-08 | Cisco Technology, Inc. | Technique for dynamically splitting MPLS TE-LSPs |
-
2006
- 2006-09-25 FR FR0653925A patent/FR2906429A1/fr active Pending
-
2007
- 2007-09-25 US US12/442,365 patent/US8223629B2/en active Active
- 2007-09-25 EP EP07823848.2A patent/EP2070268B1/fr not_active Not-in-force
- 2007-09-25 WO PCT/FR2007/052003 patent/WO2008037921A1/fr not_active Ceased
Non-Patent Citations (1)
| Title |
|---|
| See references of WO2008037921A1 * |
Also Published As
| Publication number | Publication date |
|---|---|
| US20100020679A1 (en) | 2010-01-28 |
| US8223629B2 (en) | 2012-07-17 |
| FR2906429A1 (fr) | 2008-03-28 |
| WO2008037921A1 (fr) | 2008-04-03 |
| EP2070268B1 (fr) | 2018-01-10 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP2067315B1 (fr) | Systeme pour securiser l'acces a une destination d'un reseau prive virtuel | |
| EP2067317B1 (fr) | Procédé de routage dans un réseau de commutation par étiquettes | |
| EP2070268B1 (fr) | Routeur coeur apte a securiser un routeur de sortie d'un systeme autonome | |
| EP2127270B1 (fr) | Mécanisme de protection d'un pseudo-lien | |
| EP1476990A1 (fr) | Methode dynamique et distribuee de protection locale d'un chemin a commutation d'etiquettes | |
| EP2279586B1 (fr) | Technique de protection dans un reseau de communication en mode connecte d'un arbre primaire point a multipoint | |
| WO2003071746A1 (fr) | Methode de protection locale de chemins a commutation d'etiquettes avec partage de ressources | |
| EP2332293B1 (fr) | Distribution de routes dans un réseau de routeurs | |
| EP1650910A1 (fr) | Contrôle des paramètres d'une connexion Ethernet-GMPLS | |
| EP2366236B1 (fr) | Procédé de configuration d'un circuit virtuel | |
| WO2009047439A2 (fr) | Procede de routage distribue de donnees dans un reseau, tolerant aux pannes | |
| EP2507970B1 (fr) | Procédés d'envoi et de traitement d'une réponse sip | |
| EP2238718B1 (fr) | Technique pour protéger un chemin à commutations d'étiquettes en mode connecté lors d'une panne affectant un noeud donné du chemin | |
| EP2198573B1 (fr) | Procédé pour faire communiquer entre eux une pluralité de noeuds d'extrémité à travers un réseau de communication | |
| EP2119140B1 (fr) | Procede d'acheminement par un routeur d'un paquet de donnees dans un reseau de communication par paquets supporte par un reseau de transport | |
| EP2009841A1 (fr) | Procédé de filtrage dans un réseau MPLS comprenent une structure P2MP | |
| EP2009855A1 (fr) | Procédé d'assignation d'une étiquette amont contenant une information contextuelle dans un réseau de communication à communication d'étiquettes | |
| WO2009080930A2 (fr) | Technique pour protéger un chemin à commutation d'étiquettes multipoint à multipoint en mode connecté lors d'une panne affectant un noeud donné du chemin |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
| 17P | Request for examination filed |
Effective date: 20090304 |
|
| AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR |
|
| AX | Request for extension of the european patent |
Extension state: AL BA HR MK RS |
|
| 17Q | First examination report despatched |
Effective date: 20110209 |
|
| DAX | Request for extension of the european patent (deleted) | ||
| RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: ORANGE |
|
| REG | Reference to a national code |
Ref country code: DE Ref legal event code: R079 Ref document number: 602007053729 Country of ref document: DE Free format text: PREVIOUS MAIN CLASS: H04L0012560000 Ipc: H04L0012700000 |
|
| RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04L 12/70 20130101AFI20170508BHEP |
|
| GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
| INTG | Intention to grant announced |
Effective date: 20170619 |
|
| GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
| GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
| AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR |
|
| REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D Free format text: NOT ENGLISH |
|
| REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP Ref country code: AT Ref legal event code: REF Ref document number: 963570 Country of ref document: AT Kind code of ref document: T Effective date: 20180115 |
|
| REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D Free format text: LANGUAGE OF EP DOCUMENT: FRENCH |
|
| REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602007053729 Country of ref document: DE |
|
| REG | Reference to a national code |
Ref country code: DE Ref legal event code: R081 Ref document number: 602007053729 Country of ref document: DE Owner name: TRANSPACIFIC IP GROUP LTD., GEORGE TOWN, KY Free format text: FORMER OWNER: ORANGE, PARIS, FR |
|
| REG | Reference to a national code |
Ref country code: GB Ref legal event code: 732E Free format text: REGISTERED BETWEEN 20180222 AND 20180228 |
|
| RAP2 | Party data changed (patent owner data changed or rights of a patent transferred) |
Owner name: TRANSPACIFIC IP GROUP LIMITED |
|
| REG | Reference to a national code |
Ref country code: NL Ref legal event code: MP Effective date: 20180110 |
|
| REG | Reference to a national code |
Ref country code: AT Ref legal event code: MK05 Ref document number: 963570 Country of ref document: AT Kind code of ref document: T Effective date: 20180110 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180110 |
|
| REG | Reference to a national code |
Ref country code: FR Ref legal event code: TP Owner name: TRANSPACIFIC IP GROUP LIMITED, KY Effective date: 20180613 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180110 Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180110 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180110 Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180110 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180411 Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180410 Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180110 Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180510 Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180110 Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180110 Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180110 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180110 |
|
| REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602007053729 Country of ref document: DE |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180110 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180110 Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180110 |
|
| PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180110 Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180110 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180110 |
|
| 26N | No opposition filed |
Effective date: 20181011 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180110 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180110 |
|
| REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
| REG | Reference to a national code |
Ref country code: BE Ref legal event code: MM Effective date: 20180930 |
|
| REG | Reference to a national code |
Ref country code: IE Ref legal event code: MM4A |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180925 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180925 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180930 Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180930 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180930 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180110 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20070925 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20180110 |
|
| REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 15 |
|
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20210924 Year of fee payment: 15 |
|
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20210924 Year of fee payment: 15 Ref country code: GB Payment date: 20210929 Year of fee payment: 15 |
|
| REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 602007053729 Country of ref document: DE |
|
| GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20220925 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20220930 Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20230401 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20220925 |